Bansal Institute Neering2
-
Upload
saikripa121 -
Category
Documents
-
view
214 -
download
0
Transcript of Bansal Institute Neering2
-
7/28/2019 Bansal Institute Neering2
1/11
i
BANSAL INSTITUTE OF ENGINEERING &
TECHNOLOGY, MEERUT
ENSURING DATA SECURITY
IN CLOUD COMPUTING
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS
FOR THE AWARD OF THE DEGREE OF
BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING
SESSION: - 2012-13
SUBMITTED BY:-
Avni Bindal (0937610001)
Saurav Kumar (0937610003)
Vikash Diswa (0937610004)
UNDER THE GUIDANCE OF Mr. Ishu Mittal
PROJECT GUIDE - Ms. Preksha Sindhi
SUBMITTED TO
GAUTAM BUDDHA TECHNICAL UNIVERSITY, LUCKNOW
-
7/28/2019 Bansal Institute Neering2
2/11
ii
TABLE OF CONTENTS
1. Declaration v
2. Certificate vi
3. Acknowledgments vii
4. Abstract viii
5. List of Figures ix
6. List of Abbreviations x
Chapters
1 Introduction 1
1.1 Existing System 2
1.2Proposed System 3
2 Modules 4
2.1Client Module 4
2.2 System Module 4
User Cloud Server Provider Third Party Auditor2.3 Cloud Data Storage Module 6
2.4 Cloud Authentication Server 6
2.5Unauthorized Data Modification and Corruption Module 62.6Adversary 6 Weak Adversary
-
7/28/2019 Bansal Institute Neering2
3/11
iii
Strong Adversary3 Requirement Analysis 8
3.1 Hardware Requirement 8
3.2 Software Requirement 8
4. Software Environment 9
4.1 Java Technology 9
4.2 The Java Programing Language 9
4.3 The java Platform 11
4.4 What Can Java Technology Do 12
4.5 How Will Change My Life 13
4.6 ODBC 14
4.7 JDBC 15
4.8 JDBC Goals 16
SQL Level APL SQL Conformance4.9 Network 18
TCP/IP Stack IP Diagram UDP TCP Port Address
5 System Design 27
5.1 Data Flow Diagram (DFD) 27
5.2 DFD Client 29
5.3 Activity 30
-
7/28/2019 Bansal Institute Neering2
4/11
iv
5.4 UML Sequence Diagram 31
5.5 Class Diagram 32
5.6 Use Case Diagram 33
5.7 Input Design 34
6 System Study 36
6.1 Feasibility Study 36
6.2 Economical Feasibility 37
6.3 Technical Feasibility 37
6.4 Social Feasibility 37
7 System Testing 38
7.1 Introduction 38
7.2 Unit Testing 40
7.3 Integration Testing 41
7.4 Acceptance Testing 41
8. Coding 42
9. Sample Screens 66`
10. Implementation 70
10Conclusion 73
11. Future Scope of the Project 74
12. Bibliography 75
-
7/28/2019 Bansal Institute Neering2
5/11
v
DECLARATION
We hereby declare that this submission is our own work and that, to the
best of our knowledge and belief, it contains no material previously
published or written by another person nor material which to a
substantial extent has been accepted for the award of any other degree or
diploma of the university or other institute of higher learning, except
where due acknowledgment has been made in the text.
Vikash Diswa Saurav Kumar Avni Bindal
Signature: Signature: Signature:
Name : Vikash Diswa Name : Saurav Kumar Name: Avni Bindal
Roll No.: 0937610004 Roll No.: 0937610003 Roll No.: 0937610001
Date
-
7/28/2019 Bansal Institute Neering2
6/11
vi
CERTIFICATE
This is to certify that this Project Report entitled Ensuring Data Security in Cloud
Computing, submitted by Avni Bindal (0937610001), Saurav Kumar (0937610003),
Vikash Diswa (0937610004), in the partial fulfillment, for the award of degree ofBachelor
of Technology in Department of Computer Science & Engineering, ofBansal Institute of
Engineering &Technology, Meerut, affiliated to GAUTAM BUDDHA TECHNICAL
UNIVERSITY, Lucknow; is carried out by him under my supervision.
The matter embodied in this Project Work has not been submitted earlier for award of any
degree or diploma in any university/institution to the best of our knowledge and belief.
Project Guide Head of the Department (CSE)
Ms. Preksha Sindhi Mr. Ishu Mittal
External Examiner Director
Date: __/__/____
College Seal
-
7/28/2019 Bansal Institute Neering2
7/11
vii
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the Project Work,
undertaken during B. Tech. Final Year. We owe special debt of gratitude to
Ms. Preksha Sindhi, Project Guide,
M r. Farman Khan, Lecturer,
M r. Ank it Singhal, Lecturer,
Department of Computer Science & Engineer ing,
Bansal I nstitute of Engineer ing & Technology, Meeru t
for their constant support and guidance throughout the course of our work. Their
sincerity, thoroughness and perseverance have been a constant source of inspiration for us. It
is only their cognizant efforts that our endeavors have seen light of the day.
We also take the opportunity to acknowledge the contribution of Mr. Ishu M ittal,
Head of Department, Computer Science & Engineer ing, Bansal I nstitu te of Engineer ing
& Technology, Meeru tfor his full support and assistance during the development of the
project.
We also do not like to miss the opportunity to acknowledge the contribution of all
faculty members of the department for their kind assistance and cooperation during the
development of our project.
Last but not the least, we acknowledge our friends for their contribution in the
completion of the project.
Vikash Diswa Saurav Kumar Avni Bindal
Signature: Signature: Signature:
Name : Vikash Diswa Name : Saurav Kumar Name: Avni Bindal
Roll No.: 0937610004 Roll No.: 0937610003 Roll No.: 0937610001
Date :
-
7/28/2019 Bansal Institute Neering2
8/11
viii
ABSTRACT
Cloud computing has been envisioned as the next-generation architecture of IT enterprise.In contrast to traditional solutions, where the IT services are under proper physical, logicaland personnel controls, cloud computing moves the application software and databases tothe large data centers, where the management of the data and services may not be fullytrustworthy. This unique attribute, however, poses many new security challenges which havenot been well understood. In this article, we focus on cloud data storage security, which hasalways been an important aspect of quality of service. To ensure the correctness of users'data in the cloud, we propose an effective and flexible distributed scheme with two salient
features, opposing to its predecessors. By utilizing the homomorphic token with distributedverification of erasure-coded data, our scheme achieves the integration of storagecorrectness insurance and data error localization, i.e., the identification of misbehaving
server (s). Unlike most prior works, the new scheme further supports secure and efficientdynamic operations on data blocks, including: data update, delete and append. Extensive
security and performance analysis shows that the proposed scheme is highly efficient andresilient against Byzantine failure, malicious data modification attack, and even servercolluding attacks.
-
7/28/2019 Bansal Institute Neering2
9/11
ix
-
7/28/2019 Bansal Institute Neering2
10/11
x
LIST OF FIGURES
1.
System Architecture 42. Process Flow Diagram 53. Compilation and Interpretation 94. Write Once Run Anywhere 105. Java Platform 116. Java Versions 137. TCP/IP Stack 198. J2ME Architecture 239.
Cloud Server Data Security Architecture 28
10.DFD Client 2911.Activity Diagram 3012.UML Sequence Diagram 3113.Class Diagram 3214.Use Case Diagram 3315.Screenshots 66
-
7/28/2019 Bansal Institute Neering2
11/11
xi
ABBREVIATIONS
OOPS Object Oriented Programming Concepts
TCP/IP Transmission Control Protocol/Internet Protocol
JDBC Java Data Base Connectivity
EIS
Enterprise Information Systems
BIOS Basic Input/output System
RMI Remote Method Invocation
JNDI Java Naming and Directory Interface
ORDBMS Object Relational Database Management System
CSP Cloud Service Provider (CSP)
J2ME Java 2 Micro Edition